George Stergiopoulos
George Stergiopoulos
Adjunct Lecturer, Athens Univ. of Economics & Business, Greece
Verified email at aueb.gr
Title
Cited by
Cited by
Year
Risk mitigation strategies for critical infrastructures based on graph centrality analysis
G Stergiopoulos, P Kotzanikolaou, M Theocharidou, D Gritzalis
International Journal of Critical Infrastructure Protection 10, 34-44, 2015
712015
Time-based critical infrastructure dependency analysis for large-scale and cross-sectoral failures
G Stergiopoulos, P Kotzanikolaou, M Theocharidou, G Lykou, D Gritzalis
International Journal of Critical Infrastructure Protection 12, 46-60, 2016
702016
Insider threat: enhancing BPM through social media
D Gritzalis, V Stavrou, M Kandias, G Stergiopoulos
2014 6th International Conference on New Technologies, Mobility and Security …, 2014
672014
Using centrality measures in dependency risk graphs for efficient risk mitigation
G Stergiopoulos, M Theocharidou, P Kotzanikolaou, D Gritzalis
International Conference on Critical Infrastructure Protection, 299-314, 2015
272015
Using logical error detection in remote-terminal units to predict initiating events of Critical Infrastructures failures
G Stergiopoulos, M Theoharidou, D Gritzalis
Proc. of the 3rd International Conference on Human Aspects of Information …, 2015
252015
Critical infrastructure protection tools: classification and comparison
G Stergiopoulos, E Vasilellis, G Lykou, P Kotzanikolaou, D Gritzalis
Proc. of the 10th International Conference on Critical Infrastructure Protection, 2016
212016
Hunting application-level logical errors
G Stergiopoulos, B Tsoumas, D Gritzalis
International Symposium on Engineering Secure Software and Systems, 135-142, 2012
212012
Automated detection of logical errors in programs
G Stergiopoulos, P Katsaros, D Gritzalis
International Conference on Risks and Security of Internet and Systems, 35-51, 2014
192014
On business logic vulnerabilities hunting: the APP_LogGIC framework
G Stergiopoulos, B Tsoumas, D Gritzalis
International Conference on Network and System Security, 236-249, 2013
172013
Water, water, everywhere: Nuances for a Water Industry Critical Infrastructure specification exemplar
S Faily, G Stergiopoulos, V Katos, D Gritzalis
Proc. of the 10th International Conference on Critical Infrastructures …, 0
12
Critical Infrastructure Security and Resilience
D Gritzalis, M Theocharidou, G Stergiopoulos
Springer, 2019
112019
A process-based dependency risk analysis methodology for critical infrastructures
G Stergiopoulos, V Kouktzoglou, M Theocharidou, D Gritzalis
International Journal of Critical Infrastructures 13 (2-3), 184-205, 2017
102017
CIDA: Critical Infrastructure Dependency Analysis Tool
G Stergiopoulos, P Kotzanikolaou, M Theocharidou, D Gritzalis
Information Security and Critical Infrastructure Protection Laboratory …, 2014
102014
Source code profiling and classification for automated detection of logical errors
G Stergiopoulos, P Katsaros, D Gritzalis
Proceedings of the 3rd International Seminar on Program Verification …, 2014
92014
Approaching encryption through complex number logarithms
G Stergiopoulos, M Kandias, D Gritzalis
2013 International Conference on Security and Cryptography (SECRYPT), 1-6, 2013
92013
Automatic detection of various malicious traffic using side channel features on TCP packets
G Stergiopoulos, A Talavari, E Bitsikas, D Gritzalis
European Symposium on Research in Computer Security, 346-362, 2018
82018
Interdependency analysis of junctions for congestion mitigation in Transportation Infrastructures
G Stergiopoulos, E Valvis, F Anagnou-Misyris, N Bozovic, D Gritzalis
ACM SIGMETRICS Performance Evaluation Review 45 (2), 119-124, 2017
82017
Using formal distributions for threat likelihood estimation in cloud-enabled IT risk assessment
G Stergiopoulos, D Gritzalis, V Kouktzoglou
Computer Networks 134, 23-45, 2018
72018
Combining Invariant Violation with Execution Path Classification for Detecting Multiple Types of Logical Errors and Race Conditions.
G Stergiopoulos, P Katsaros, D Gritzalis, TK Apostolopoulos
SECRYPT, 28-40, 2016
72016
Demonstration and empirical analysis of hunting application-level logic errors
G Stergiopoulos, V Tsoumas, D Gritzalis
Proc. of the 7th International Conference on Network and System Security …, 2013
62013
The system can't perform the operation now. Try again later.
Articles 1–20